A Decentralized Information Flow Model for SaaS Application Security

被引:2
|
作者
Liu Tingting [1 ]
Zhao Yong [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450012, Henan, Peoples R China
关键词
Software as a Service; Cloud computing security; information flow control; decentralized privileges;
D O I
10.1109/ISDEA.2012.17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Software as a Service(SaaS) is a popular cloud service, but the SaaS providers have no security garantee for users. The SaaS providers may insert some malicious code in their applications with the primary goal of lifting user data. In order to address this problem, we introduce the security approach of Decentralized Information Flow Control (DIFC) and present a DIFC model that applies at the granularity of operating system processes for SaaS application security. The model allows untrusted software to compute with private data while trusted code controls the dissemination of that data. The trusted code is small which can be monitored easily. In addition, the model can be used in existing applications and allows safe interaction between conventional and DIFC-aware processes. Finally, we prove that the new model can enforce the security requirements of SaaS users.
引用
收藏
页码:40 / 43
页数:4
相关论文
共 50 条
  • [31] Probabilistic Information Flow Security
    Gruska, Damas P.
    FUNDAMENTA INFORMATICAE, 2008, 85 (1-4) : 173 - 187
  • [32] DECENTRALIZED INFORMATION AND CONTROL - NETWORK FLOW EXAMPLE
    LAU, R
    VARAIYA, PP
    PERSIANO, RC
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1972, AC17 (04) : 466 - &
  • [33] Unwinding in information flow security
    Bossi, A.
    Focardi, R.
    Macedonio, D.
    Piazza, C.
    Rossi, S.
    Electronic Notes in Theoretical Computer Science, 2004, 99 : 127 - 154
  • [34] A decentralized model of information pricing in networks
    Polanski, Arnold
    JOURNAL OF ECONOMIC THEORY, 2007, 136 (01) : 497 - 512
  • [35] Information Theory and Security: Quantitative Information Flow
    Malacaria, Pasquale
    Heusser, Jonathan
    FORMAL METHODS FOR QUANTITATIVE ASPECTS OF PROGRAMMING LANGUAGES, 2010, 6154 : 87 - 134
  • [36] An Information Flow Security Model for Home Area Network of Smart Grid
    Tong, Jizhou
    Sun, Weiqing
    Wang, Lingfeng
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 456 - +
  • [37] Research on Security Provenance Model of Information-flow in Electronic Commerce
    Wang, Fengying
    Li, Xiumei
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 905 - 910
  • [38] Model Checking the Information Flow Security of Real-Time Systems
    Gerking, Christopher
    Schubert, David
    Bodden, Eric
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 27 - 43
  • [39] Healthcare SaaS Based on a Data Model with Built-In Security and Privacy
    Asija, Ruchika
    Nallusamy, Rajarathnam
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (03) : 1 - 14
  • [40] Automatic Load Testing of Web Application in SaaS Model
    Stupiec, Emil
    Walkowiak, Tomasz
    NEW RESULTS IN DEPENDABILITY AND COMPUTER SYSTEMS, 2013, 224 : 421 - 430